Ethics in Hacking
Name
Institution
Hacking and Ethics
Hacking is the process through which individuals identify some weaknesses in passwords and gain access to information. Hacking can be defined as “Using password cracking algorithm to gain access to a system.” As we turn to the world ruled by technology, computers have to turn out to be mandatory to about every organization (Lin, 2016. Computers systems perform best when working under a network system (Lin, 2016). Sometimes individuals may access the data with the authority of the owners; this is hacking. Therefore, “Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data.” Therefore, many corporates lose millions through hacking, making a lot of organizations need to strengthen their systems, which should constantly be updated.
Hackers are usually individuals with a lot of computer knowledge; they are mostly computer programmers with a lot of knowledge in the security system. There are different types of hackers, depending on their specificity of intent.
- Ethical Hacker (White hat) – This is a computer programmer that gains access to systems to resolve problems and fix them. These experts may also execute infiltrationTesting and defenselessness valuations.
- Cracker (Black hat) – This a computer expert with a lot of programming experience; however, these individuals gain access to information without the owner’s consent with individual interest. The intention is to gain access to valuable data such as bank account, still information, or in worst cases, transfer funds to their accounts.
- Grey hat- A hacker that gain access into computers systems to identify weakness and sell the same weakness to the business owner.
- Script kiddies- This is a less skilled hacker but uses the same tools to hack the computers.
Other hackers that are not so popular are Phreaker; these persons are mainly associated with hacking phone systems. Also, Hacktivist these mainly uses hacking to convince individuals through information sent on social media (Mayer, 2017). Hacking is always termed as a crime; precisely, it is one of the cybercrime. However, there are many incidences through which hacking may be justified in hacking ethics. In such circumstances, ethical hacking is a situation that must be planned (Mayer, 2017). There is a need to determine all strategic and tactical issues as this what ethics demands; before hacking, the hacker and the system owner should agree on why they should perform the process.
References
Lin, P. (2016). Ethics of Hacking Back: Six arguments from armed conflict to zombies.
Mayer, J. (2017). Government hacking. Yale LJ, 127, 570.